Mobile-driven architecture for managing enterprise security policies
暂无分享,去创建一个
[1] Andreas Schaad,et al. Observations on the role life-cycle in the context of enterprise security management , 2002, SACMAT '02.
[2] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[3] Seunghun Jin,et al. A role‐based infrastructure management system: design and implementation , 2004, Concurr. Pract. Exp..
[4] Gerhard Schimpf,et al. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization , 2000, RBAC '00.
[5] Jean Bacon,et al. Access control and trust in the use of widely distributed services , 2001, Softw. Pract. Exp..
[6] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[7] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[8] Mark Strembeck,et al. A scenario-driven role engineering process for functional RBAC roles , 2002, SACMAT '02.
[9] Seunghun Jin,et al. On modeling system-centric information for role engineering , 2003, SACMAT '03.
[10] Ravi S. Sandhu,et al. Secure Role-Based Workflow Models , 2001, DBSec.
[11] Ravi S. Sandhu,et al. Engineering authority and trust in cyberspace: the OM-AM and RBAC way , 2000, RBAC '00.
[12] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .